General

  • Target

    d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.bin

  • Size

    120KB

  • Sample

    220216-n7l71achfm

  • MD5

    031d9264f4c5fb68ab00e9b820a5a869

  • SHA1

    268c830c713756bd60a33f765f49e6207ab3d2e5

  • SHA256

    d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158

  • SHA512

    0bce0870090603f68c7f5e5902accaaf1b79afc5d13d983ac28881a3f4ce268fb3ea50594609333de96801b0400f8bea4cae25d8c9b2f364b55d8b06d2bc4c72

Malware Config

Extracted

Family

allcome

C2

http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/exp.php?usr=Rachel

Wallets

DCbpjBAroXBj3jrvq8HRPAKd8wYPnBwwi7

rKewCaU4Q6gqJnb5nJqkDY69QoxHKXAJZi

Xiem2Rw5LULbzv6rM49FqKAKD1nHSxpjxb

TZ3Pn82NBECik8ujtc3Wu5AVsQLCdt7cG1

t1Pxn7QZPAVhrsd2cdPHDEjDR1jtwpoUvbT

GDKPOPZWADWVDB2B743X7Q5QIMXIFJTIJ3K3JTR5P2EKO22GJQRAZRKC

497qdSyfY8t9dYnAGTnk8UigUbUPL4MXTFAxobWPDZ5rReSiVNL22GEGt9ptgNbDbTe3qyj3oRq2LfEYbws8yGqnSjBWHR6

qra53qtr5kvaye7gvf5algrre5h0w6harqxluum6kp

bc1q79xgc502sqzt4qz0jhr7lr7qdxkf2z006gym0l

0x9bd5f03363CA0231A32b3B36ae2cf01623E2D1fE

LcPqsR8yyzukNBgoKrq3pKEXV4rpuMeF91

ronin:09864801afc2b70c960366f4c8ad806fe9d6965d

Targets

    • Target

      d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.bin

    • Size

      120KB

    • MD5

      031d9264f4c5fb68ab00e9b820a5a869

    • SHA1

      268c830c713756bd60a33f765f49e6207ab3d2e5

    • SHA256

      d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158

    • SHA512

      0bce0870090603f68c7f5e5902accaaf1b79afc5d13d983ac28881a3f4ce268fb3ea50594609333de96801b0400f8bea4cae25d8c9b2f364b55d8b06d2bc4c72

    • Allcome

      A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

    • suricata: ET MALWARE Win32/ClipBanker.OC CnC Activity M1

      suricata: ET MALWARE Win32/ClipBanker.OC CnC Activity M1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v6

Tasks